lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 03 Aug 2009 10:27:22 +0200
From:	Tomasz Chmielewski <mangoo@...g.org>
To:	linux-kernel@...r.kernel.org, linux-netdev@...r.kernel.org
Subject: WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()

After upgrading from 2.6.29.1 to 2.6.30.4, I'm getting these warnings in dmesg.

Let me know if you need more info.

Other than that, the device seems to work stable.


------------[ cut here ]------------
WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
Hardware name: Altos G510
Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
Pid: 2222, comm: openvpn Not tainted 2.6.30.4-1 #4
Call Trace:
 [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
 [<4011f04e>] ? warn_slowpath_null+0xa/0xc
 [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
 [<402796a4>] ? sk_free+0x10/0xa7
 [<402b5964>] ? inet_release+0x3f/0x44
 [<4027751b>] ? sock_release+0x11/0x52
 [<40277575>] ? sock_close+0x19/0x1c
 [<40164026>] ? __fput+0xa6/0x149
 [<40161989>] ? filp_close+0x4e/0x54
 [<401619f5>] ? sys_close+0x66/0x9c
 [<401027c8>] ? sysenter_do_call+0x12/0x26
---[ end trace bdfe445acbab5307 ]---
------------[ cut here ]------------
WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
Hardware name: Altos G510
Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
Pid: 2222, comm: openvpn Tainted: G        W  2.6.30.4-1 #4
Call Trace:
 [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
 [<4011f04e>] ? warn_slowpath_null+0xa/0xc
 [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
 [<402796a4>] ? sk_free+0x10/0xa7
 [<402b5964>] ? inet_release+0x3f/0x44
 [<4027751b>] ? sock_release+0x11/0x52
 [<40277575>] ? sock_close+0x19/0x1c
 [<40164026>] ? __fput+0xa6/0x149
 [<40161989>] ? filp_close+0x4e/0x54
 [<401619f5>] ? sys_close+0x66/0x9c
 [<401027c8>] ? sysenter_do_call+0x12/0x26
---[ end trace bdfe445acbab5308 ]---
------------[ cut here ]------------
WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
Hardware name: Altos G510
Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
Pid: 2222, comm: openvpn Tainted: G        W  2.6.30.4-1 #4
Call Trace:
 [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
 [<4011f04e>] ? warn_slowpath_null+0xa/0xc
 [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
 [<402796a4>] ? sk_free+0x10/0xa7
 [<402b5964>] ? inet_release+0x3f/0x44
 [<4027751b>] ? sock_release+0x11/0x52
 [<40277575>] ? sock_close+0x19/0x1c
 [<40164026>] ? __fput+0xa6/0x149
 [<40161989>] ? filp_close+0x4e/0x54
 [<401619f5>] ? sys_close+0x66/0x9c
 [<401027c8>] ? sysenter_do_call+0x12/0x26
---[ end trace bdfe445acbab5309 ]---



-- 
Tomasz Chmielewski
http://wpkg.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ